IOC Report
Scan_8346203.pdf

loading gif

Files

File Path
Type
Category
Malicious
Scan_8346203.pdf
PDF document, version 1.7, 0 pages
initial sample
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF4dab1e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\b8e68365-e7cd-4512-85bb-40afb589c549.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\e24183e0-205c-4a46-aa32-a59a945ce19b.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241023134946Z-167.bmp
PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.7440
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSId7009.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-23 09-49-44-368.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\0b430132-9c3c-4127-8315-8bccb1e94efd.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\4dbcaacc-310a-4641-8719-15264c37e2d7.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 42290
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\c5851ddd-b5e1-4a0f-b23f-cd27657d0443.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\fef12b90-7f53-42d3-92cb-e99a16bfdafe.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
Chrome Cache Entry: 155
ASCII text, with very long lines (47531)
downloaded
Chrome Cache Entry: 156
ASCII text, with very long lines (47531)
dropped
Chrome Cache Entry: 157
PNG image data, 100 x 51, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 158
PNG image data, 75 x 42, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 159
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 160
PNG image data, 100 x 51, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 161
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 162
PNG image data, 75 x 42, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 163
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure.adnxs.com/clktrb?id=273568&redir=https://jck78.com/?vxnoikdr&qrc=chadh@swsequipment.com
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1848,i,1315002678073995833,2122692420934737617,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\Scan_8346203.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2116 --field-trial-handle=1728,i,10941213394857104829,14257179787104440112,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8

URLs

Name
IP
Malicious
https://jck78.com/?vxnoikdr&qrc=chadh@swsequipment.com
89.185.80.82
malicious
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/i/8d723494bbe84798/1729691525690/XB3U0sGVU29jEae
104.18.94.41
http://x1.i.lencr.org/
unknown
https://www.adobe.co
unknown
https://jck78.com/?vxnoikdr=880e15807634923128bf18dece7c3b0cfc410b59bc7d9c1e07e25471b4949dbc77987d3d6d2513454fe9df597b85d82d8e12fd2b382042dc7f51dbf5a3a430dd&qrc=chadh%40swsequipment.com
https://jck78.com/favicon.ico
89.185.80.82
https://jluplies.com/mail/?login_hint=chadh%40swsequipment.com
89.185.80.82
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/cmg/1
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=8d723494bbe84798&lang=auto
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/681bb/0x4AAAAAAAxdiiKD2EEuNsCE/auto/fbE/normal/auto/
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/pat/8d723494bbe84798/1729691525688/a810fef1e10ab0bc12cc45103b1cd4bcd468e93f386db101ea687f5dacd38886/7obvoHK8qpnulho
104.18.94.41
https://jluplies.com/?qrc=chadh%40swsequipment.com
89.185.80.82
https://jluplies.com/?dataXX0=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL2psdXBsaWVzLmNvbS8iLCJkb21haW4iOiJqbHVwbGllcy5jb20iLCJrZXkiOiJpUkJTbkg0S3pKcEUiLCJxcmMiOiJjaGFkaEBzd3NlcXVpcG1lbnQuY29tIiwiaWF0IjoxNzI5NjkxNTM3LCJleHAiOjE3Mjk2OTE2NTd9.QwJV6X1SaqwE-7JByQHZIUMnsHs5FKoCvunV7zlKeuA
89.185.80.82
https://secure.adnxs.com/bounce?%2Fclktrb%3Fid%3D273568%26redir%3Dhttps%3A%2F%2Fjck78.com%2F%3Fvxnoikdr%26qrc%3Dchadh%40swsequipment.com
185.89.210.82
https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallback
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/flow/ov1/150771774:1729689910:p8Qxtq7WNILb6-siv4vcDNh6dpNAcN8X8JscqHaIb58/8d723171ada52cc3/swK3pOLcOrrEJU0Pn9Qc9SE6GO7fxiR1LvoR0Nr15WQ-1729691394-1.1.1.1-0kYzJU.WhxqvkpHfkBfDeHr..nYZnyRchZ1PaoXg9LOcgOS3oCr5dGnk542mzV4e
104.18.94.41
https://secure.adnxs.com/clktrb?id=273568&redir=https://jck78.com/?vxnoikdr&qrc=chadh@swsequipment.com
185.89.210.82
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/pat/8d723171ada52cc3/1729691397622/f4b2b424bc712c064b78a2e1ed9769d89fa50d4848092967c4ad905095b5b724/Ji3N84oUGsRf2hj
104.18.94.41
https://challenges.cloudflare.com/turnstile/v0/g/f2bbd6738e15/api.js
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=8d723171ada52cc3&lang=auto
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/i/8d723171ada52cc3/1729691397620/0TeX4Fg9E0U4vho
104.18.94.41
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jck78.com
89.185.80.82
malicious
secure.adnxs.com
unknown
malicious
challenges.cloudflare.com
104.18.95.41
jluplies.com
89.185.80.82
www.google.com
142.250.186.68
ib.anycast.adnxs.com
185.89.210.82
x1.i.lencr.org
unknown

IPs

IP
Domain
Country
Malicious
89.185.80.82
jluplies.com
Russian Federation
malicious
142.250.186.68
www.google.com
United States
104.18.94.41
unknown
United States
192.168.2.7
unknown
unknown
104.18.95.41
challenges.cloudflare.com
United States
239.255.255.250
unknown
Reserved
185.89.210.82
ib.anycast.adnxs.com
Germany
96.7.168.138
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
There are 10 hidden registries, click here to show them.

DOM / HTML

URL
Malicious
https://jck78.com/?vxnoikdr=880e15807634923128bf18dece7c3b0cfc410b59bc7d9c1e07e25471b4949dbc77987d3d6d2513454fe9df597b85d82d8e12fd2b382042dc7f51dbf5a3a430dd&qrc=chadh%40swsequipment.com
https://jck78.com/?vxnoikdr=880e15807634923128bf18dece7c3b0cfc410b59bc7d9c1e07e25471b4949dbc77987d3d6d2513454fe9df597b85d82d8e12fd2b382042dc7f51dbf5a3a430dd&qrc=chadh%40swsequipment.com
https://jck78.com/?vxnoikdr=880e15807634923128bf18dece7c3b0cfc410b59bc7d9c1e07e25471b4949dbc77987d3d6d2513454fe9df597b85d82d8e12fd2b382042dc7f51dbf5a3a430dd&qrc=chadh%40swsequipment.com
https://jck78.com/?vxnoikdr=880e15807634923128bf18dece7c3b0cfc410b59bc7d9c1e07e25471b4949dbc77987d3d6d2513454fe9df597b85d82d8e12fd2b382042dc7f51dbf5a3a430dd&qrc=chadh%40swsequipment.com